Description | This article explains how FortiSASE handles route processing in scenarios where SSLVPN subnets overlap with SPA BGP routes. |
Scope | FortiSASE. |
Solution |
In FortiSASE, the IPAM configuration can be enabled: Region IP addresses
A FortiSASE instance supports unique IP address ranges for remote VPN and edge endpoints per FortiSASE security PoP using IPAM within the overall 100.65.0.0/16 range, by default. The below subnets from the following private IP pools are available:
The IP pools assigned to VPN and edge devices may overlap with SPA BGP routes, particularly within the 10.0.0.0/8 range.
To resolve this conflict, the excluded subnets must be modified to permit routing from the HUB. For example, the 10.128.0.0/16 is excluded:
config router bgp config router route-map end
config router prefix-list
From the BGP routing table:
FGT $ get router info bgp network VRF 10 BGP table version is 9, local router ID is 10.251.1.1 Network Next Hop Metric LocPrf Weight RouteTag Path Total number of prefixes 3
In the above example, the FortiSASE IPAM exclude subnets configuration creates a double 'deny' action in both the route map and the prefix list. Without this exclusion configuration, the BGP route will not be received. |